4.8 Article

A Lightweight Authentication Mechanism for M2M Communications in Industrial IoT Environment

Journal

IEEE INTERNET OF THINGS JOURNAL
Volume 6, Issue 1, Pages 288-296

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/JIOT.2017.2737630

Keywords

Industrial Internet of Things (IIoT); lightweight authentication; machine-to-machine (M2M) communications; security; sensors

Funding

  1. Power Semiconductor and Electronics Manufacturing 4.0 (SemI40) [692466]
  2. Electronic Component Systems for European Leadership Joint Undertaking under Grant ECSEL JU
  3. Fundacao para a Ciencia e Tecnologia from Austria [CSEL/0009/2015]
  4. Fundacao para a Ciencia e Tecnologia from Germany [ECSEL/0009/2015]
  5. Fundacao para a Ciencia e Tecnologia from Italy [ECSEL/0009/2015]
  6. Fundacao para a Ciencia e Tecnologia from France [ECSEL/0009/2015]
  7. Fundacao para a Ciencia e Tecnologia from Portugal [ECSEL/0009/2015]

Ask authors/readers for more resources

In the emerging industrial Internet of Things (IIoT) era, machine-to-machine (M2M) communication technology is considered as a key underlying technology for building IIoT environments, where devices (e.g., sensors, actuators, and gateways) are enabled to exchange information with each other in an autonomous way without human intervention. However, most of the existing M2M protocols that can be also used in the IIoT domain provide security mechanisms based on asymmetric cryptography resulting in high computational cost. As a consequence, the resource-constrained IoT devices are not able to support them appropriately and thus, many security issues arise for the IIoT environment. Therefore, lightweight security mechanisms are required for M2M communications in IIoT in order to reach its full potential. As a step toward this direction, in this paper, we propose a lightweight authentication mechanism, based only on hash and XOR operations, for M2M communications in IIoT environment. The proposed mechanism is characterized by low computational cost, communication, and storage overhead, while achieving mutual authentication, session key agreement, device's identity confidentiality, and resistance against the following attacks: replay attack, man-in-the-middle attack, impersonation attack, and modification attack.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.8
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available